Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp538212pxx; Thu, 29 Oct 2020 08:27:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyDyjiiA9KWxH3sVIrdzD1YVkcTX3CHxEpzG5v3oIL3jmH4lJxM1hdhyk+uJ5fYG7OZBjJR X-Received: by 2002:a17:906:af47:: with SMTP id ly7mr4871137ejb.532.1603985255699; Thu, 29 Oct 2020 08:27:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603985255; cv=none; d=google.com; s=arc-20160816; b=rSirSyaHop8MgC4hOOg2aucHZkUsqtjO+29kr/kMCGtKn8GEjQZHVwiR8E2+7zX94E cjYF6fiQUZE5JjRotG7qbnZYDXrIvfY4jWY6qRek0ISzT098q1+OekzMUNhEJ7ylPDYo VAB6AKyTDUpHGNl2zc0VYUlscSNCf4Q4CjhJS7/U/b7j7z4oaYA7WvTKZuVEhAjDQpsk gD3TaHaqIOUqllMUiUGvAcrf4asXNdAXC/JuRbtpL8vmwyo2EBaFwQOc2TJgRS5UmL0I FJHv+pGz4NQybCBarTJOSXHOrwbusymi2HmllOgYH0+KxOg8Gx71F6QeKiuJnhlD2ICy smog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :sender:dkim-signature; bh=HvgcHzvgNIHPBHqniJljI4Ra8aRcuzZdi/nFEGJJmlk=; b=im6vmSjCLs4mWl/DF0l8t5omT49udjn1XpfWVS4XDlYIxJlrKgkht6Ge+u7aFdmo7N jkQNQylsvTlEkouIJGXtKgqjY90ixW+Tw65EBISCloAbOvkvCzyrPc61pWRbBFaH+0Tx W+r2Nvj4jFNpkPsJJZh2Qx8sEarMDi80dkZRF6RhOFQNDm0eKNP0Wr6Gy2ml0Gxu02wF z2h5ou3iOe/OXgtcstUlP7oi1mkm7v5TReZaBgo6HzMuy5kejZIKA6zIS/4WT/gm+EGY YCO8ZqTuo2Xztz4GJduvFMzGzxQ9QMibUGeJDAVrXbngxjdzuu0iHPoCAQnbDVhPrGVb y/Ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="Um/m2vHR"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a95si2206464edf.1.2020.10.29.08.27.12; Thu, 29 Oct 2020 08:27:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="Um/m2vHR"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728164AbgJ2PZs (ORCPT + 99 others); Thu, 29 Oct 2020 11:25:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728023AbgJ2PZr (ORCPT ); Thu, 29 Oct 2020 11:25:47 -0400 Received: from mail-qt1-x849.google.com (mail-qt1-x849.google.com [IPv6:2607:f8b0:4864:20::849]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7860DC0613D7 for ; Thu, 29 Oct 2020 08:25:45 -0700 (PDT) Received: by mail-qt1-x849.google.com with SMTP id h31so2070851qtd.14 for ; Thu, 29 Oct 2020 08:25:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:to:cc; bh=HvgcHzvgNIHPBHqniJljI4Ra8aRcuzZdi/nFEGJJmlk=; b=Um/m2vHRRFZAYWoO06a+XLlpac03GEvrXOXS1V20I2AKQk4w5GkBfkGV/46D8ZpN5S BWxWNch8CArb5m/vTHZUEc4EfIYBgA+rxQqiC+T2dHpCn3nvzQ05mU5/q+kNNCP5ViVw ONGRXSiS594/R1bUFbRO1aGw4Tv9iiF20MUy8dmo0sXdejh5PBrAyNONbIyx3LRdQXi+ ut87BXzrd+IhzK3P7N72GV1q5E0T5rZ6Uhw2+wi94u4KLMo5i3+3MH67qqSG3M9NZPt6 c1RlmzZytANnC76GOxqvpz1TgczJ+bazkHTJ1b6CtG+nALo7EOjOUE98IZH7TJFubCbt ILAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :to:cc; bh=HvgcHzvgNIHPBHqniJljI4Ra8aRcuzZdi/nFEGJJmlk=; b=MEAyTNC8sR64G7+4ELxAmd7ppaG4yaulomxheeMa1KSnAUK6o7QB8co0uHWAZj/cL6 h/99TaYmO8naTjv5tUZU+ID5nge0nGKrnPjAptNl13ZJJkr1wZiXR+v7NnUfpRX8y2yI fz9cYx+f86MXubq5OC6+qDx7i1xLP202ijtuXaC+lLCQ1teDR7OQvWwdNg+DfLTqF0bL uOletL69R489F04fdXutyzuMW5JG3uRS8LiRkIm79QHCVMyty2gxt2oHnSGYteTaGe0T vbVRJhvTLcKXlPxJUUalXrn+ReXOGnpTpdWmGLjt2pRmI915DbBsxL/Lkl4nzWh5UE2d nOSg== X-Gm-Message-State: AOAM530dUe/RbPaM/uL6X48/7CDZN/2oP01I4CGnS6MgqmT7eKhNMKCe ZAVzVkhwbRy7YJ/6iB1vbdgsxoZyiQc= Sender: "glider via sendgmr" X-Received: from glider.muc.corp.google.com ([2a00:79e0:15:13:f693:9fff:fef4:9ff]) (user=glider job=sendgmr) by 2002:ad4:4770:: with SMTP id d16mr2851186qvx.61.1603985144473; Thu, 29 Oct 2020 08:25:44 -0700 (PDT) Date: Thu, 29 Oct 2020 16:25:39 +0100 Message-Id: <20201029152539.3766146-1-glider@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.29.1.341.ge80a0c044ae-goog Subject: [PATCH v5] x86: add failure injection to get/put/clear_user From: Alexander Potapenko To: akpm@linux-foundation.org, bp@alien8.de, mingo@redhat.com, corbet@lwn.net, tglx@linutronix.de, arnd@arndb.de Cc: akinobu.mita@gmail.com, hpa@zytor.com, viro@zeniv.linux.org.uk, glider@google.com, andreyknvl@google.com, dvyukov@google.com, elver@google.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, x86@kernel.org, albert.linde@gmail.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Albert van der Linde To test fault-tolerance of user memory acceses in x86, add support for fault injection. Make both put_user() and get_user() fail with -EFAULT, and clear_user() fail by not clearing any bytes. Reviewed-by: Akinobu Mita Reviewed-by: Alexander Potapenko Signed-off-by: Albert van der Linde Signed-off-by: Alexander Potapenko --- v2: - no significant changes v3: - no changes v4: - instrument the new out-of-line implementations of get_user()/put_user() - fix a minor checkpatch warning in the inline assembly v5: - rebase after another change to put_user() - fix an issue reported by kernel test robot --- --- arch/x86/include/asm/uaccess.h | 38 +++++++++++++++++++++------------- arch/x86/lib/usercopy_64.c | 3 +++ 2 files changed, 27 insertions(+), 14 deletions(-) diff --git a/arch/x86/include/asm/uaccess.h b/arch/x86/include/asm/uaccess.h index c9fa7be3df82..036467b850f8 100644 --- a/arch/x86/include/asm/uaccess.h +++ b/arch/x86/include/asm/uaccess.h @@ -5,6 +5,7 @@ * User space memory access functions */ #include +#include #include #include #include @@ -126,11 +127,16 @@ extern int __get_user_bad(void); int __ret_gu; \ register __inttype(*(ptr)) __val_gu asm("%"_ASM_DX); \ __chk_user_ptr(ptr); \ - asm volatile("call __" #fn "_%P4" \ - : "=a" (__ret_gu), "=r" (__val_gu), \ - ASM_CALL_CONSTRAINT \ - : "0" (ptr), "i" (sizeof(*(ptr)))); \ - (x) = (__force __typeof__(*(ptr))) __val_gu; \ + if (should_fail_usercopy()) { \ + (x) = 0; \ + __ret_gu = -EFAULT; \ + } else { \ + asm volatile("call __" #fn "_%P4" \ + : "=a" (__ret_gu), "=r" (__val_gu), \ + ASM_CALL_CONSTRAINT \ + : "0" (ptr), "i" (sizeof(*(ptr)))); \ + (x) = (__force __typeof__(*(ptr))) __val_gu; \ + } \ __builtin_expect(__ret_gu, 0); \ }) @@ -220,15 +226,19 @@ extern void __put_user_nocheck_8(void); void __user *__ptr_pu; \ register __typeof__(*(ptr)) __val_pu asm("%"_ASM_AX); \ __chk_user_ptr(ptr); \ - __ptr_pu = (ptr); \ - __val_pu = (x); \ - asm volatile("call __" #fn "_%P[size]" \ - : "=c" (__ret_pu), \ - ASM_CALL_CONSTRAINT \ - : "0" (__ptr_pu), \ - "r" (__val_pu), \ - [size] "i" (sizeof(*(ptr))) \ - :"ebx"); \ + if (unlikely(should_fail_usercopy())) { \ + __ret_pu = -EFAULT; \ + } else { \ + __ptr_pu = (ptr); \ + __val_pu = (x); \ + asm volatile("call __" #fn "_%P[size]" \ + : "=c" (__ret_pu), \ + ASM_CALL_CONSTRAINT \ + : "0" (__ptr_pu), \ + "r" (__val_pu), \ + [size] "i" (sizeof(*(ptr))) \ + : "ebx"); \ + } \ __builtin_expect(__ret_pu, 0); \ }) diff --git a/arch/x86/lib/usercopy_64.c b/arch/x86/lib/usercopy_64.c index 508c81e97ab1..5617b3864586 100644 --- a/arch/x86/lib/usercopy_64.c +++ b/arch/x86/lib/usercopy_64.c @@ -7,6 +7,7 @@ * Copyright 2002 Andi Kleen */ #include +#include #include #include @@ -50,6 +51,8 @@ EXPORT_SYMBOL(__clear_user); unsigned long clear_user(void __user *to, unsigned long n) { + if (should_fail_usercopy()) + return n; if (access_ok(to, n)) return __clear_user(to, n); return n; -- 2.29.1.341.ge80a0c044ae-goog